THE WHATIS.COM WORD-OF-THE-DAY June 6, 2002 IDEF ______________ TODAY'S SPONSOR: The .tv Corporation
Save 30% on Web addresses! Not only will you get a great deal on your Web addresses, but you'll also get superior customer service, innovative products and services and a place that is easy to register and manage your Web addresses. Great names are still available. Register the names you want before someone else does! Check it out now: http://WhatIs.com/r/0,,3768,00.htm?the.tvcorporation ______________ TODAY'S WORD: IDEF See our definition with hyperlinks at http://searchwebservices.techtarget.com/sDefinition/0,,sid26_gci831251,00.html IDEF (for Integrated Definition) is a group of modeling methods that can be used to describe operations in an enterprise. IDEF was created by the United States Air Force and is now being developed by Knowledge Based Systems. Originally developed for the manufacturing environment, IDEF methods have been adapted for wider use and for software development in general. Sixteen methods, from IDEF0 to IDEF14 (and including IDEF1X), are each designed to capture a particular type of information through modeling processes. IDEF methods are used to create graphical representations of various systems, analyze the model, create a model of a desired version of the system, and to aid in the transition from one to the other. IDEF is sometimes used along with gap analysis. The following table lists the IDEF methods either current or in development. IDEF0 through IDEF4 are the methods most commonly used. IDEF METHODS IDEF0 Function Modeling IDEF1 Information Modeling IDEF1X Data Modeling IDEF2 Simulation Model Design IDEF3 Process Description Capture IDEF4 Object-Oriented Design IIDEF5 Ontology Description Capture IDEF6 Design Rationale Capture IDEF7 Information System Auditing IDEF8 User Interface Modeling IDEF9 Scenario-Driven IS Design IDEF10 Implementation Architecture Modeling IDEF11 Information Artifact Modeling IDEF12 Organization Modeling IDEF13 Three Schema Mapping Design IDEF14 Network Design As an example of the process, IDEF0 methods are used to model the functions of an enterprise, creating a graphical model that shows: what controls the function, who performs it, what resources are used in carrying it out, what it produces, and what relationships it has to other functions. RELATED TERMS: enterprise http://searchwin2000.techtarget.com/sDefinition/0,,sid1_gci212065,00.html Unified Modeling Language http://searchdatabase.techtarget.com/sDefinition/0,,sid13_gci214158,00.html ______________________ SELECTED LINKS: The IDEF Web site explains the IDEF family of methods in detail. http://www.idef.com/ Popkin Software provides additional information about IDEF. http://government.popkin.com/methods/idef.htm SearchWebServices includes modeling products in its list of "Best Web Links for Product Briefs and Reviews." http://searchwebservices.techtarget.com/bestWebLinks/0,289521,sid26_tax288570,00.html ______________________ WHATIS DISCUSSION FORUM | The Virtual Watercooler It's been fun (and informative) hanging around the new whatis.com discussion forum. It feels a little like talking to co-workers in the lunch room. TODAY'S QUESTION: What other IT newsletters do you subscribe to? Add your two cents to the discussion and you automatically have a chance to win a magical TechTarget baseball cap! Wearing it will make you smarter. http://whatis.discussions.techtarget.com/WebX?[EMAIL PROTECTED]^6@.1dcf9e64!viewtype=&skip=&expand= ______________________ QUIZ #27 | Security awareness for end users Studies show that a company's biggest security threat is its own employees. The SANS Institute recommends that organizations should take time to educate their employees about computer security and periodically test employees to make sure they understand the basics. To help you in your efforts to raise security awareness in your organization, we've created the following quiz: http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci826572,00.html _________________________________________________________ LESS THAN 3 WEEKS UNTIL OUR FREE SECURITY DECISIONS EVENT Time's running out to attend Security Decisions June 19-21 at the Hilton Chicago Hotel. There are still seats left but you should act now or risk being shut out. FREE attendance available at: http://www.securityconf.com/html/registration.htm Benefit from top strategies to make the most cost-effective security purchases, expert tactics to close specific security holes in your system, and the most effective ways to manage network security (without breaking the bank). Apply today! ______________________________ RECENT ADDITIONS AND UPDATES [1] Fax Group http://whatis.techtarget.com/definition/0,,sid9_gci827309,00.html [2] IPLC http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci827417,00.html [3] restore point http://searchwin2000.techtarget.com/sDefinition/0,,sid1_gci827077,00.html [4] glocalization http://searchebusiness.techtarget.com/sDefinition/0,,sid19_gci826478,00.html [5] GLONASS http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci826952,00.html ____________________________________________________________________ ::::::::::::::::::: WHATIS.COM CONTACTS ::::::::::::::::::: LOWELL THING, Site Editor ([EMAIL PROTECTED]) ____________________________________________________________________ MARGARET ROUSE, Assistant Editor ([EMAIL PROTECTED]) ___________________________________________________________________ :::::::::::::::::::: ABOUT THIS NEWSLETTER ::::::::::::::::::::: Created by TechTarget (http://www.techtarget.com) TechTarget - The Most Targeted IT Media Copyright 2002, All Rights Reserved. If you would like to sponsor this or any techtarget newsletter, please contact Gabrielle DeRussy at [EMAIL PROTECTED] Unsubscribe from 'Word of the Day' - Simply Reply to this Email with REMOVE within the Body or Subject > or - Go to: http://WhatIs.techtarget.com/register - Log in to edit your profile. - Click on the link to Edit email subscriptions. - Uncheck the box next to the newsletter you wish to unsubscribe from. - When finished, click "Save Changes to My Profile."